Sciweavers

796 search results - page 66 / 160
» Spoofing prevention method
Sort
View
ASPDAC
2008
ACM
98views Hardware» more  ASPDAC 2008»
13 years 12 months ago
A unified methodology for power supply noise reduction in modern microarchitecture design
In this paper, we present a novel design methodology to combat the ever-aggravating high frequency power supply noise (di/dt) in modern microprocessors. Our methodology integrates ...
Michael B. Healy, Fayez Mohamood, Hsien-Hsin S. Le...
CIKM
2008
Springer
13 years 12 months ago
Conflict ontology enrichment based on triggers
In this paper, we propose an ontology-based approach that enables to detect the emergence of relational conflicts between persons that cooperate on computer supported projects. In...
Chahnez Zakaria, Olivier Curé, Kamel Sma&iu...
AP2PC
2005
Springer
13 years 12 months ago
A Trust Management Scheme in Structured P2P Systems
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
CIVR
2008
Springer
154views Image Analysis» more  CIVR 2008»
13 years 11 months ago
Video linkage: group based copied video detection
Sites to share user-created video clips such as YouTube and Yahoo Video have become greatly popular in recent years. One of the challenges of such sites is, however, to prevent vi...
Hung-sik Kim, Jeongkyu Lee, Haibin Liu, Dongwon Le...
AMW
2010
13 years 11 months ago
Robust Clustering of Data Streams using Incremental Optimization
Discovering the patterns in evolving data streams is a very important and challenging task. In many applications, it is useful to detect the dierent patterns evolving over time and...
Basheer Hawwash, Olfa Nasraoui